General

  • Target

    BootStrapper.exe

  • Size

    2.9MB

  • Sample

    250303-yklm3axks3

  • MD5

    8828ce17966882f2e7ea3c2b81784b5e

  • SHA1

    6c9f94b8caf056559a1d369afb79c15352437cba

  • SHA256

    d07347612a8c2a0251dff5d9e0dd0cfbd525c420c8b6da1811737d7823332e3c

  • SHA512

    d1deb6b1bb5fef47ba9a59d0c787bc76c8f623e5b5b7b510353189c29f1272f2434abb0af01428d323784107a4485ad1f4522e40c0dc604d6c4e6b64c6866c7c

  • SSDEEP

    49152:xEUytQiBSHhKt8zXa1qH2L878d4Nmmev3Hsw1e27ACRIoHmEY3YZuhoo:CNtQlHh3X/2L/RmOswzAe+E/u9

Malware Config

Extracted

Family

xworm

Attributes
  • Install_directory

    %AppData%

  • install_file

    Sihost.exe

  • pastebin_url

    https://pastebin.com/raw/hA5YVNf1

Targets

    • Target

      BootStrapper.exe

    • Size

      2.9MB

    • MD5

      8828ce17966882f2e7ea3c2b81784b5e

    • SHA1

      6c9f94b8caf056559a1d369afb79c15352437cba

    • SHA256

      d07347612a8c2a0251dff5d9e0dd0cfbd525c420c8b6da1811737d7823332e3c

    • SHA512

      d1deb6b1bb5fef47ba9a59d0c787bc76c8f623e5b5b7b510353189c29f1272f2434abb0af01428d323784107a4485ad1f4522e40c0dc604d6c4e6b64c6866c7c

    • SSDEEP

      49152:xEUytQiBSHhKt8zXa1qH2L878d4Nmmev3Hsw1e27ACRIoHmEY3YZuhoo:CNtQlHh3X/2L/RmOswzAe+E/u9

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks